F-SECURE LINUX SECURITY Manual page 18

Table of Contents

Advertisement

18 | F-Secure Linux Security | Installation
/etc/opt/f-secure
/var/opt/f-secure
In addition, the installation creates the following symlinks:
/usr/bin/fsav -> /opt/f-secure/fssp/bin/fsav
/usr/bin/fsic -> /opt/f-secure/fsav/bin/fsic
/usr/bin/fsui -> /opt/f-secure/fsav/bin/fsui
/usr/share/man/man1/fsav.1 -> /opt/f-secure/fssp/man/fsav.1
/usr/share/man/man8/fsavd.8 -> /opt/f-secure/fssp/man/fsavd.8
Changed System Files
/etc/passwd: Two new user accounts (fsma and fsaua) are created during the installation
/etc/group: A new group (fsc) is created during the installation
crontab of the root user: The virus definition database update command is added to the root
crontab during the installation. Scheduled scanning tasks are added to the crontab when
they are created.
Network Resources
When running, the product reserves the following IP ports:
Interface
Protocol
lo
tcp
lo
tcp
lo
tcp
any
tcp
Memory
The Web User Interface reserves over 200 MB of memory, but since the WebUI is not used all
the time, the memory is usually swapped out. The other product components sum up to about
128 MB of memory, the on-access scanner uses the majority of it.
The memory consumption depends on the amount of file accesses on the system. If several
users are logged in to the system and all of them access lots of files, the memory consumption
grows.
Port
Comment
28005
Web User Interface internal communication port
28078
PostgreSQL alert database
28080
Local Web User Interface access
28082
Remote SSL Web User Interface access (if enabled)

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents